Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 47

“Enter to Learn, Leave to Serve”

Excellence Coaching Network IX


Science Computer

Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer

CHAPTER # 5
Computer Security & Ethics
Q.1 Define computer security?
A. Computer Security:
Computer security is also known as cyber security or IT security.
Computer security is the protection of information systems from theft or
damage to the hardware, the software, and the information on them, as well
as from disruption or misdirection of the services they provide.
Q.2 Why is computer security important? Write any three reasons?
A. Importance Of Computer Security:
Computer security is important because it keeps out information
protected. It’s also important for our computer’s overall health; proper
computer security helps prevent viruses and malware, which allows programs
to run quicker and smoother. It safeguards confidential and sensitive
information. Some reasons given below for computer security:
1. TO PREVENT FROM DATA THEFT:
Data theft is act of stealing sensitive information such as bank account
details credit card information, passwords, and documents which sotred
on computers, servers, or other devices, So, prevent from data theft we
have to ensure our device security by using endpoint security, lock
down our computers, identify critical data and use authentication.
2. TO PREVENT FORM VIRUSES AND MALWARE:
Computer security is also important to protect from computer viruses
and malwares. A computer virus of malware can corrupt or delete our
sensitive data, damage our had disk and it spreads from one computer
to another using email program and others.
3. TO PROTECT PERSONAL INFORMATION:
To prevent form cyber security risk, we have to protect our personal
information. Its security is the first-time issue to protect our personal
and other information. We can keep our information secure using
antivirus software, strong password, avoid phishing emails, backup our
data etc.
Q.3 Explain the importance of computer security in daily life?
Page47

A. Importance Of Computer Security In Daily Life:


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
The advancement in science and technology gas changed the ways we
live and carry out day to day activities. We rely on computers and mobile
phones to carry out many activities. While using computers and mobile
phones we access a lot of information which we do not want to share with
others. This information may include our passwords, banking details,
contacts, pictures, etc. to protect this information we need to make our device
secured that no one can damage or access this information without our
consent.
Q.4 Define various terms related to computers security?
A. Some different terminologies used in computer security are as follows:
1. COLUD:
A technology that allows us to access our files and / or services through
the internet from anywhere in the world. Technically speaking, it’s a
collection of computers with large storage capabilities that remotely serve
requests.
2. EXPLOIT:
A malicious application or script that can be used to take advantage of
computer’s vulnerability.
3. ENCRYPTION:
The process of encoding data prevent theft by ensuring the data can
only be accessed with a key.
4. UNAUTHORIZED ACCESS:
An unauthorized access is when someone gains access to a server,
website, or other sensitive data using someone else’s account details.
5. VULNERABILITY:
It is a weakness, a design problem or implementation error in a system
that can lead to an unexpected and undesirable event regarding security
system.
6. ANTIVIRUS OR ANTIMALWARE:
Antivirus is a software that operators on different OS which is used
prevent from malicious software.
7. SOCIAL ENGINEERING”
It is a technique that a hacker uses to stole data by a person for different
for purpose by psychological manipulation combined with social
scenes.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
8. FIREWALL:
It is a software or hardware which is used to filter network traffic based
on rules.

Q.5 Describe cybercrime in detailed.


A. CYBERCRIME:
Cybercrime is the crime that is committed through a computer and
network. Cybercriminal uses devices to gain unauthorized access to
important information. Stealing password and important information, caking
social media accounts, accessing anyone else’s account and making
transactions, committing online frauds are some of the examples of
cybercrime. Cybercrime is illegal and also punishable.
i. Hackers:
A computer hacker is a computer expert who uses their technical
knowledge to achieve certain goal, or overcome certain obstacle,
within a computer programmer, it has become associated in popular
culture with a “security hacker”. There are different types of
hackers; such as, black hacker, with hacker, grey hacker etc.
ii. Crackers:
Crackers are persons who gain unauthorized access to another
system. They bypass passwords or licenses of computer programs,
change source code or intentionally breach computer security. They
do it with negative intentions. Crackers can also make targeted
system unavailable or non – functional. They commit these activities
generally for money but they may do it for fame or just for challenge
or fun.
Q.6 Explain computer crimes by giving real life example.
A. COMPUTER CRIME IN REAL LIFE:
As technology is growing the data security has become so crucial. We
can be a victim of computer crime at any time. There are many genres of
computer crime or now called cybercrimes. Some examples of such crimes in
real life are discussed here.
1. HACKING:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Hacking is perhaps the most common crime in the computer world.
Hackers can steal our Wifi, email or social media account’s passwords.
Hackers also attack a website and take it down. However, the scope of
hacking is much wider. The hackers a can also steal sensitive
information.

2. CREDIT AND DEBIT CARD SCAN:


Keeping debit or credit cards is a common practice but insecure use of
these cards be dangerous. If a person has information about our debit or
credit card, he or she can make fraudulent transactions. There is various
way to get this information.
One way through scamming. Scammers set small machine inside
an ATM or credit card machine. Debit and credit cards are also secured
with PIN codes. Users has to keep this code secrete otherwise any
person can use the card for online shopping and other purpose.
3. PHISHING:
Phishing is a method of trying to gather personal information using
false e –mails and website. In phishing, criminals contact the target
person through email, telephone or text message and pose as a real and
trusted individual.
4. CLICKJACKING:
Click jacking is an attack that tricks a user into clicking a webpage
element which is invisible or disguised as another element. Usually,
culprits target children or novice internet users to click on a link
containing malware or trick them into sharing private information via
social media sites.
5. CYBER BULLYING OR HARASSMENT:
Cyber bullying or cyber harassment is a form of bullying using
electronic1 means like a computer, mobile phone or internet. They are
also known as online bullying. Harmful bullying behavior can include
posting rumors, threats, passing inappropriate remarks, leaking
personal information, blackmailing and committing hate speech. The
perpetrator does it with the intent to cause harm to the victim. Cyber
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
bulling is often done by children, who have increasingly early access to
these technologies.
Q.7 What is Ethical Hacking?
A. ETHICAL HACKING:
Ethical Hacking is an authorized practice of bypassing system security
to identify potential data breaches and threats in a network. Ethical
hackers aim to investigate the system or network for weak points that
malicious hackers can exploit or destroy. Ethical hackers generally
use the same hacking skills that malicious actors use to attract
enterprise. Ethical hackers use port scanning tools, such as Nmap,
Nessus or Wireshark, to scan a company’s system, identify open ports,
study the vulnerabilities of each port and take remedial action.

Q.8 Give two examples of phishing?


A. EXAMPLES OF PHISHING:
1. URGENT REQUEST (EMAIL IMPERSONATION):
These are targeted and simple forms of phishing emails designed to get
victims to purchase gift cards, or to give up personal email or phone
numbers. The “email compromise” gets its name because the attacker
mimics the email of a known sender. However, these can also be sent
through a legitimate, albeit hacked account.
The messages start out as basic greetings then progressing into request
for money or data. Since the content is highly personalized it’s often
easy to get hooked.
2. STUDENTS PART – TIME JOB:
These are targeted and simple from of phishing emails designed to get
victims to interact and establish a report. The message starts out a basic
greeting or join opportunities and then progress into requests for money
or data.
Q.9 What to do in case becoming a victim?
A. If you believe that you’ve become a victim of a cybercrime, you need
to alert that local police and, in some cases the FBI and the federal
Trade Commission. This is important even if the crime seems minor.
Your report may assist authorities in their investigations or may help to
thwart criminals from taking advantage of other people in the future. In
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Pakistan, the National Response Centre for Cyber Crimes has been set
up to help the victims of cybercrimes. An online compliant can be
launched through the form available on the website or help may be
sought by calling helpline 9011 which is available 24/7.
If you think cybercriminals have stolen your identity. These are among
the steps you should consider.
 Contact the companies and bank where you know fraud occurred.
 Place fraud alerts and get your credit reports.
 Report identity to the FTC (Federal Trade Commission).

Q.10 Explain how to seek help against cybercrime?


A. Anyone using the internet should exercise some basic precautions
against cybercrime.
1. USE A FULL – SERVICE INTERNET SECURITY SUITE:
For instance, Norton Security provides real – time protection against
existing and emerging malware including ransom ware and viruses, and helps
protect your private and financial information when you go online.
2. USE STRONG PASSWORDS:
Don’t repeat our passwords on different sits, and change our passwords
regularly. Make them complex. That means using a combination of at least
10 letters, numbers, and symbols. A password management application can
help us to keep our passwords locked down.
3. KEEP YOUR SOFTWARE UPDATED:
This is especially important with our operating system and internet
security software. Cyber criminals frequently use known exploits, or flaws, in
our software to gain access to our system. Patching those exploits and flaws
can make it less likely that we ‘ll become a cybercrime target.
4. MANAGE YOUR SOCIAL MEDIA SETTINGS:
Keep our personal and private information locked down. Social
engineering cyber criminals can often get our personal information with just a
few data points, so the less we share publicly, the better. For instance, if you
post pet’s name or reveal our mother’s maiden name, we might expose the
answers to two common security questions.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
5. TALK TO YOUR CHILDERN ABOUT THE INTERNET:
We can teach our kids about acceptable use of the internet without
shutting down communication channels. Make sure they know that they can
come to us if they’re experiencing any kind of line harassment, stalking, or
bullying.
Q.11 Define computer virus and how to prevent them.
A. COMPUTER VIRUS:
Computer virus is a software program that can spread from one
computer to another computer or one network to another network without the
user’s knowledge and causing potential harm computer’s data, files and hard
drive.

PREVETION OF COMPUTER VIRUS ATTACK:


Computer viruses are disguised as different ways such as hyperlinks,
pop – ups or email attachments of image, audio or video files. However, the
best ways for prevention of computer virus attack are follows:
1. USE ANTIVIRUS SOFTWARE:
Antivirus software is a program that helps to prevent computer threats
such as viruses, hackers, and different types of malware threats.
2. REGULAR SCAN YOUR COMPUTER:
Regularly scanning our computer with an antivirus software is one of
the easiest and best ways to prevention of computer virus attack and
removing infections.
3. KEEPING OUR WEB BROWSER UP TO DATE:
Keeping our web browser up to date is very important for protection of
computer virus attack and ensuring that web pages are load properly.
4. DON’T CLICK ON SUSPICIOUS EMAIL LINKS:
One of the biggest sources of malware of virus is suspicious emails,
called spam. A suspicious that may contains a virus or malware script
to redirect us to a vulnerable website to hack our information.
5. NEVER DOWNLOAD SOFTWARE FROM UNRELIABLE
SITES:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Cyber expert also recommended that downloading the software and
apps from trusted sources but our common habit is that, we are
downloading free software from unknown unreliable.
6. DO NOT DOWNLOAD UNTRUSTED EMAIL
ATTACHEMENTS:
Sometimes we will receive an email from unknown sender address
which seems suspicious e – mail with an attachment file. The
attachment file may contain virus or malware script, if we download
and open the file then virus will execute and infect to our computer.
Q.12 Define malware and explain its types.
A. 1. MALWARE:
Malware is a program that is written generally to cause a mess. They
can be so dangerous that they can also damage devices. However commonly
malware encrypt, steal or delete data, hijack core functions of computing and
disturb different activities.

TYPES OF MALWARE: There are different types of malware.


1. Computer virus
2. Worm
3. Adware
4. Spyware
1. COMPUTER VIRUS:
A computer virus is a computer program that can spread across
computers and network by making copies of itself, usually without then
user’s knowledge. It can also modify other computer programs, insert
its own code and change computer setting. Viruses are harmful. Boot
Sector, Resident, Macro viruses and File infector are some examples of
viruses.
2. WORM:
A computer worm spread copies of itself from computer to computer.
A worm can replicate itself without any human interaction. It does not
need to attach itself to a file or program to cause damage. It can do
several malicious tasks, such as dropping other malware deleting files,
consuming internal storage and memory resources, etc.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
3. ADWARE:
Adware is advertising – supported software. Commonly, adware is web
– bases and collects web browser data to target advertisements,
especially pop – ups. Adware can also change the different setting of
internet browsers like homepage and default search engine. Normally,
these are not as dangerous as other malware. Adware programs include
games, desktop toolbars or utilities.
4. SPWARE:
Spyware is malware that monitors a device and steals important
information about a person organization without their consent and
sends such information to another person organization. Spyware takes
control over a mobile phone or computer without the user’s knowledge.
System monitors, cookies trackers, root kits and key – loggers are few
examples of spyware.

Q.13 Identify that a virus, worm, adware, spyware and malware can
spread through different ways.
A. WAYS OF VIRUS SPREAD:
There are different ways to spread virus from one device to another
device.
i. USB FLASH DISK AND CDS:
USB flash Disks are the most common media to transfer files. An
infected computer can spread a virus to a clean USB flash disk that
is inserted and likewise an infected USB can transmit the virus onto
a clean computer. Copying infected files from the USB or CD can
also infect the computer.
ii. INTERNET DOWNLOADS:
Computer viruses also spread through files or software downloads
from the internet. They can be attached to software or files that we
download. They virus come from the internet can also make our
computer accessible to hackers.
iii. COMPUTER NETWORK:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Users must be careful because files picked from a Local Area
Network (LAN) may infected and cause damage to our computer or
operating system. The same can happen to transfer files from one
mobile device to another mobile device via Bluetooth etc.
iv. EMAIL ATTACHMENTS:
Email attachments have been a popular medium to spread viruses.
viruses can easily be transferred from one computer to another
through email attachment. The infected emails may come from an
unknown or fake email address. Perpetrators who spread these
viruses use either fake email or change a few letters in a trusted
email address.
Q.14 Write any two measure to avoid email account hacking?
A. MEASURES TO AVOID EMAIL ACCOUNT HACKING:
We can protect our email account by using some steps:
1. USE A STRONG PASSWORD:
Our email password is the only thing standing between our private
personal information and Identify theft. Therefore, it needs to be as
strong as possible. The key ingredients of a strong password are length
(with longer being); a mix of letters (upper and lowercase), number,
and symbols; no connection to your personal data; and no dictionary
words.
2. PROJECT YOUR ADDRESS:
While our email address is hardly a secret (as everyone can see it on
each email you send) there’s no reason to give it out when we don’t
need to. For example, don’t post our email address on social media or
include it in blog post comments because cybercriminals constantly
scraping these sources for new victims.
Q.15 What is antivirus and explain any three-antivirus software?
A. ANTIVIRUS:
Anti – virus is a utility software which is used to prevent, detect, and
remove malware. Antivirus software works in the background and monitors
every software that is running and the emails or data coming from the
internet. In case of any suspicious activity antivirus alerts the user and asks
for action. Antivirus software was originally developed detect and remove
computer viruses. some most common antiviruses are:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
AVAST ANTIVIRUS:
A vast is one of the largest security companies in the world. A vast
Antivirus is a family of cross – platform internet security applications
developed by A vast for Microsoft Windows, MacOS, Android and iOS. It is
a cross – platform solution that includes antivirus protection, web threat
scanning, browser protection, and a cloud management console.
NORTON ANTIVIRUS:
Norton Antivirus software is a program that protects our computer and
stops viruses spyware, worms and Trojan horses from entering and causing
harm. Norton Antivirus performs constant scans to our computer to protect it
as our surf websites, download files and open email. Norton Antivirus is
updated regularly and automatically so that our computer remains safe.
MCAFEE ANTIVIRUS:
McAfee is an antivirus software which protects everything on our PC
and keeps it safe from viruses. McAfee antivirus software guards our
computer and data against all major cyber threats, such as viruses, ransom
ware, malware, up wanted programs, spyware and more.

Q.16 How can we wave our computer system from malware?


A. Some simple measures can prevent our system from malware and
viruses.
1. Install anti – virus software and keep it updated.
2. Run scheduled scans regularly with your anti – virus software.
3. Keep your operating system updated.
4. Do not click on internet links which have unusual labels, image or
captions.
5. Do not open email attachments or click hyperlinks form unknown or
captions.
6. Scan USB flash drive, SD cards and mobile phones before opening.
7. Use our spam blocking or filtering tools to block unsolicited emails,
instant messages and pop – ups.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
8. Only download files and programs from trusted sources on the internet.
9. Never use an open Wi-Fi.
Q.17 Write down the steps for keeping the backup of data.
A. STEPS FOR KEEPING THE BACKUP OF DATA:
We should also take some measure to recover data from any potential
loss. Some steps in this regard are:
1. Create a system restore point regularly and check if it is not disabled.
2. Write important data on CDs or DVDs. Since they are write –
protected, they do not catch viruses.
3. Have the back – up important files at more than one place.
4. We can also save documents on cloud storage like Google Drive and
Microsoft One Drive.
Q.18 Describe the authentication mechanism?
A. AUHENTIC MECHANISM:
The authentication mechanism is the hardware or software – based
mechanism that forces users to prove their identity before accessing data on a
device. The process makes sure the only authenticated user gets access to
data or devices.
TYPES OF SECURITY MECHANISM:
There are many ways a computer security system may authenticate a
user, some of them are given below:
i. Username and password
ii. Personal Identification Number (PIN)
iii. Biometric Verification
i. USERNAME AND PASSWORD:
A username and password are the pair of keywords known by users.
They are presented to the computer to authenticate the user.
Usernames and password s are the default authentication mechanism
on the web today.
ii. PERSONAL IDENTIFICATION NUMBER:
PIN stands for Personal Identification Number. It is a security code
for verifying our identify. Similar to a password, our PIN should be
kept secret because it allows access to important services such as
financial transactions and confidential emails. The PIN provides
security when a credit/debit card is lost or stolen
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
iii. BIOMETRIC VERIFICATION:
Biometrics verification makes sure that the real person gets access to
the data or device. Biometric authentication relies on the unique
biological characteristics of a person. Biometric authentication
systems capture data in real – time and compare it with existing data
n database.
Q.19 What is information accuracy and Why is information accuracy
important?
A. INFORMATION ACCURACY:
The information accuracy is the type of measurement that assures the
information is correct and true. It is also necessary that the information
should not be generated from the malicious data.
Information accuracy is important because may the life of people
depend on it like the medical information at the hospitals, so the
information must be accurate. And the accuracy represents all organization
actions. The quality of information measured by accuracy timeliness,
completeness, relevance and if the easy to understood by the users, so the
accuracy, important for quality of information. To get accurate information
we need the right value.
Q.20 What is an Intellectual Property Right and explain its types?
A. INTELLECTUAL PROPERTY RIGHT:
The term “Intellectual Property Rights” refers to the legal rights
granted with the aim to protect the creations of the intellect. These rights
include Industrial Property Rights (e.g patents, industrial designs and
trademarks) and Copyright (right of the author or creator) and Related Rights
(rights of the performs, producer and broadcasting organizations). Intellectual
property rights given to persons over the creations of their minds. Intellectual
property is intangible creations of the human intellect.
TYPES OF INTELLECTUAL PROPERTY RIGHTS:
1. Patent
2. Copyright
3. Trademark
1. PATENT:
A patent is an intellectual property (IP) right for a technical
invention. Patent means protected by a government issued right
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
allowing someone to make and sell a product or service for a certain
number of years without anyone being allowed to copy it. A patent is
important because it can help safeguard our invention. The three types
of patents are utility patents, design patents, and plant patens.
2. COPYRIGHT:
Copyright refers to the legal right of the owner of intellectual property.
In simpler terms, copyright is the right to copy. Copy right is a type if
intellectual property that gives its owner the exclusive right to make
copies of a creative work, usually for a limited time. The creative work
may be in a literary, artistic, educational, or musical form.
3. TRADEMARK:
A trademark is a type of intellectual property consisting of
recognizable sign, design, or expression which identifies products or
services of a particular source from those of others. Trademark helps
organizations to market their products and services locally and
globally. It can be an easily recognized word, phrase, logo or symbol
often mentioned as TM.
Q.21 Explain software piracy and its impacts.
A. SOFTWARE PIRACY:
Software piracy is referred to the illegal use, copying or distribution of
copyrighted software. Software piracy is a huge threat to the software
industry. It causes a significant loss of revenue for develops and vendors.
Because of piracy, vendors have fewer resources to devote to research and
development of new products. Since they earn less profit, they are forced to
pass these costs on to their customers.
Software companies have tried various techniques to stop software
piracy but most of them have remained unsuccessful. They applied for copy –
protection which demands the user to enter certain keys or credentials.
Today, most software require registration which is mainly online. However,
these measures could not stop software piracy.
Q.22 How is software piracy harmful for software developers?
A. The losses suffered as a result of software piracy directly affect the
profitability of the software industry. Because of the money lost to pirates,
development of new products, have less revenue to justify lowering software
prices and are forced to pass these costs on to their customers. Consequently,
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
software developers, and vendors are taking serious actions to protect their
revenues. It is also worth noting that the use of pirated software also drives
up the costs for legitimate users – which gives legitimate users all the more
reasons to help fight piracy to help fight piracy by reporting to SIIA those
organization and individuals who are not “playing by the rules”.
Q.23 Write a short note on plagiarism?
A. PLAGIARISM:
Plagiarism is a type of cheating that involves the use of another
person’s ideas, words design, art, music, etc., as one’s own in whole or in
part without acknowledging the author or obtaining his or her permission.
Academic honesty demands that the users of any ideas, words and data
should acknowledge the originators. Plagiarism is unethical and can have
serious consequences. There are online services to cheek and fix the
plagiarism issues. Academic organizations hire the plagiarism detection
service. One of the most used services is Turnitin.
ABBREVIATIONS
CHAPTER # 5 “COMPUTER SECURITY & ETHICS”
SR.NO ABBREVIATIONS FULL FORMS
01 ATM Automated Teller Machine
02 PIN Personal Identification Number
03 IPO Intellectual property Organization

CHAPTER # 6
WEB DEVELOPMENT
Q.1 What is meant by web development?
A. WEB DEVELOPMENT:
Web development refers to building, creating and manipulating websites.
Page47

This is done by coding in different languages and by using several web


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
developments tools and frameworks. These tools make it easy for anyone to create
and edit their own website using a web-based interface. A complete web
application may consist of a User Interface, Back – End Server Codes and
Database.
Q.2 Define the basic terms of web development?
A. i. WORD WIDE WEB:
The World Wide Web (WWW) is commonly known as the web. It is a
network of online contact that is formatted in HTML and accessed via HTTP. The
terms refer to all the interlinked HTML page that can be accessed over the internet.
ii. WEB PAGE:
A web or webpage is a document, commonly written in HTML, that is
viewed in an Internet browser. A web page can be accessed by entering a URL
address into a browser’s address bar. A web page may contain text, graphics, and
hyperlinks to other web pages and files.
iii. WEBSITES:
A website is a collection of web page containing text, images, and all types
of multimedia related to a specific set of information. A website can be accessed
through a Uniform Resource Locator (URL).
iv. UNIFORM RESOURCE LOCATOR (URL):
URL stands for Uniform Resource Locator, and is used to specify
addresses on the World Wide Web. A URL is the fundamental network
identification for any resource connected to the web like
(https://,www.google.com).
v. WEB BROWSER:
A web browser is an application software used to access and view websites
on the World Wide Web. The most common web browsers include Microsoft
Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
vi. WEB SERVER:
A web server is a computer that runs websites. The basic objective of the
web server is to store, process and deliver web pages to the users. This inter-
communiication is done using Hypertext Transfer Protocol (HTTP).

vii. WEB HOSTING:


Web Hosting is a service that allows a web developer to make website
publicly accessible through the internet. Web hosting is basically the space that we
buy on a web server to store our website files.
viii. SEARCH ENGINE:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Search Engine is a web – based tool that allows Internet users to search for
content via the World Wide Web (WWW). A user enters keywords into a search
engine and receives a list of Web content results in the form of websites, image
videos or other online data. Most popular search engine are Google, Yahoo and
Bing.
ix. HOME PAGE:
The home page is the first page of the website. The term can also refer to
one or more pages always shown in a web browser when the application starts up.
Q.3 Differentiate between web hosting and web server?
A. DIFFERENCES BETWEEN WEB SERVER AND WEB HOSTING:
WEB SERVER WEB HOSTING
A web server is a computer that Web hosting is a service that allows us
connects other web users to our site to view and publish our content on the
from anywhere in the world. internet.
It is used to store, process and deliver It is used to connect the website of
web pages to the users. companies and individual to the World
Wide Web network.
Web server is a high – tech machine Web host is company which offers web
where we can easily access to all the hosting service.
information

There are mainly different types of web There are four different types of hosting
servers: Proxy servers, mail servers, server: Shared, Virtual Private Server
applications servers and Lite Speed. (VPS), Dedicated Web Server, and
Cloud Hosting.

Q.4 Compare various types of website?


A. TYPES OF WEBSITES:
There are different types of websites, are as follows
1. Portal 2. News 3. Information 4. Educational
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
5. Personal 6. Business 7. Blogs 8. Forums
9. Entertainment 10. Social
1. PORTAL:
A web portal is a website that provides as single access point of information
for all of its users. It collects information from different sources like emails,
forums, search engine and presents it to the user in a uniform way. Yahoo and
MSN are common example of web portal.
2. NEWS:
A news website is the modern – day alternative for newspapers. Such
websites contain everyday information related to current affairs, sports, politics,
weather, health, technology, entertainment, etc.
3. INFORMATION:
Information websites provide detailed information of any field. There are
many dedicated informational websites for science, arts, sports, online trainings,
research etc.
4. EDUCATIONAL:
Educational website are purely designed to deliver educational material for
both teachers and student such as metropolis academy. edu.pk, khan academy. org,
etc.
5. PERSONAL:
A person can share about his or her biography or achievements in a custom
developed website.
6. BUSINESS:
A business website is the best way for any organization to market their
products and services. It also talks about the teams, policies and procedures of that
business. For instance, www.psx.com.pk is the website of Pakistan Stock
Exchange.
7. BLOGS:
A blog is a special type of website that is composed of articles and posts.
These articles are organized into categories and sorted by the time when they were
published. Word press is a popular blog site.
8. FORUMS:
A forum is an online place where different users can discus about any topic.
These topics can be categorized so that users can easily locate topics of their
interest.
9. ENTERTAINMEN:
An entertainment website serves content like videos or games purely for the
Page47

purpose of entertainment. You Tube is widely used for entrainment.


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
10. SOCIAL:
Social website is a platform where different people get together and socialize
with each other. They can also share their ideas, opinions and media. Face book
and Twitter are instances of social networking websites.
Q.5 What are the steps involved in creating webpage in HTML?
A. SEPTS INVOLVED IN CREATING A WEBSITE:
Creating a simple web page using HTML is very easy. It requires a text
editor, a file with. Html extension and web browser to view that page.

STEP 1: TEXT EDITOR:


Start by simply creating a new blank file in a text editor of our choice. A
simple text editor like noted can be used to start coding HTML for a web page.
SETP 2: WRITE HTML CODE IN TEXT EDITOR:
We will write the HTML coding in the text editor (Notepad).
STEP 3: SAVE HTML PAGE:
Go to File menu and click on Save. Make sure to provide htm or html extension for
the file belong saved. This will save the document as a web page instead of a plain
text file.
STEP 4: VIEW HTML PAGE IN BROWSER:
Open the saved HTML file in our default web browser, e.g. (Google Chrome,
Internet Explorer). The web browser will automatically translate HTML codes to
correctly display the web page.
Q.7 Explain HTML tags, HTML elements and HTML attributes.
A. HTML TAGS:
The codes used in HTML are called tags and are donated by angular
brackets (<>). There are various HTML tags. Some define the appearance of the
content. Some carry actual content such as text, image, videos, etc. Some provide
additional information about the web page.
EXAMPLES:
<html>, <head>, <title>, <body>, etc.
HTML EMENTS:
HTML elements are the building blocks of HTML page. These elements are
defined by place HTML tags in our document
EXAMPLES:
<h1> to <h6>, <p>, <hr> tags etc.
Page47

HTML ATTRIBUTES:
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
HTML attributes are used to describe the characteristics of an HTML
element in detail HTML attributes are found only in the starting tag, HTML
attributes specify various additional properties to existing HTML element.
EXAMPLE
<tag-name attribute – name = “attribute value”> content </tag-name>
<img src = “image /smiley.png “width = “30” height = “30” alt = “Smiley”>

Q.8 Differentiate between <head>, <title> and <h1> to <h6> tags.

A. DIFFERENTIATE BETWEEN <HEAD>, <TITLE> AND <H1>


t0<H6> TAGS:
<head> <title> <h1> to <h6>
The <head> tag is <Title> tag is shown in <h1> to <h6> tags are
placed between the browser’s title bar on shown in the HTML
<html> tag and the page’s tab. document structure.
<body> tag.
It is used to define It defines the title of a It specific six level of
additional information web page. HTML headings (h1,
about the web page. h2, h3, h4, h5 and h6).

It contains a set of tags It contains only one tag. It contains <h1> being
such as <title>, <meta>, heaviest heading and
<style>, <script>, etc. <h6> being the lightest
heading.
Q.9 Write down the functions of paragraph and line break tags?
A. PARAGRAGH TAG:
<p> tag defines a paragraph of text in a webpage. It always starts from a
new line and adds space before and after its text.
LINE BREAK TAGS
<br> tag defines a line break and starts the following content form a new
line. Unlike <p> tag, it does not add space before or after the book.
<hr> tag draws a horizontal line where it is defined. It is used to
Page47

differentiate between sections of the page.

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Q.10 Define the different text formatting tags:
A. TEXT FORMATTING TAGS:
Some most commonly used text formatting tags in HTML are:
1. <b>, <i>, <u>:
These tags are used to bold, italicize and underline text respectively.
2. <pre>:
It is used to define a preformatted text.
3. <font>
It is used to define the font, size and color of its text. This tag can be
composed with three attributes: size, color and face.
4. <center>:
It is used to align its text to the horizontal center of the web page.
5. <sub>:
It defines subscript text which is under the baseline of other text and has
a smaller size. E.g. H2O
6. <sup>
It defines superscript text which is slightly above the normal line of other
text and has a smaller size. E.g. E = mc2
Q.11 How many types of HTML lists and write down the differences between
ordered list and unordered list?
A. TYPES OF LIST:
HTML provides three different types of list element namely:
1. Unordered Lists
2. Ordered list
3. Description List
DIFFERENCES BETWEEN ORDERED AND UNORDERED LIST:
ORDERED LIST UNORDERED LIST
It is also known as number list. It is known as bulleted list.
“OL” stand for Order list. “UL” stand for Unordered list.
It has an order of items which is It has no order of items which has a
signified by number, Roman numeral bullet preceding.
or alphabetical character.
Page47

An “ordered list” starts with the <ol> An “unordered list” starts with the
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
tag. <ul> tag.
Q.12 Define description list and nested list in HTML?
A. DESCRIPTION LIST:
Description list are used to display different terms and their description just
like in a dictionary or glossary. It is defined by <dl> tag and each of its list items is
composed of two elements: term and description. Term is defined by <dt> tag and
its description is defined by <dd> tag.
NESTED LIST:
A nested list is a list that appears an element in another list. Its mean one list
can be placed inside of another. It is useful for things like tables of contents that
contain sub – section. A nested list, for example, can be used to create an outline.
It is defined by placing the new list tag inside the <li> tag of previous list.
Q.13 How are image displayed in an HTML page?
A. Image can be inserted in an HTML documents by using <img> tag. Image’s
tag. Images are not technically inserted (copy, paste, etc). into a web page; image
is linked to web page. The <img> tag creates a holding space for the referenced
image. The <img> tag is empty, it contains attributes only, and does not have a
closing tag. </img>. It contains five attributes out which two are required and three
are optional.

Q.14 How can we apply border to an image in a web page by using html?
A. The border attributes of the IMG elements adds a border around an image.
When an image is used as a link, the browser will automatically display a border
of the image. If we want to rid the image of the border, specify 0 for the value of
the border attribute.
EXAMPLE: <img src = “a. jpg” border = “2”>

Q.15 How can we specify width and height of image in html?


A. The height and width of an image can be set using height width and
attribute. The height and width can be set in terms of pixels. The <img> height
attribute is used to set the height of the image in pixels. The <img> width attribute
is used to set the width of the image in pixels.
EXAMPLE: < “img src = “app. Jpg” width = “200” height =” 120”>

Q.16 How can we specify an alternate text for the image in html?
A. The required alt attribute specifies and alternate text for an image, if the
Page47

image cannot be display. The alt attribute provides alternative information for an
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
image if a user for some reason cannot view it (because of slow connection, an
error in the src attributes, or if the user uses a screen reader). The alt attribute is
required if the href attribute is present.
EXAMPLE: <img src = “app.jpg” alt = “Introduction”>

Q.17 How can we apply background color to a web page?


A. We set the background color in HTML, use the bgcolor attributes. The
bicolor attributes is used with the HTML <body> tag. This attribute is used to
change the color of the entire web page. Its color value can be defined as RB code,
hexadecimal code or by color name. for instance, to set the background floor of the
web page to green., we can use any one of these values: rgb (0,255,0) or #00FF00
or green.
EXAMPLE <body bgcolor = green”>

Q.18 How can a user be redirected to another web page?


A. Hyperlinks allows a user to navigate from one web page to another. It also
enables users to navigate to different sections within the same web page.
Hyperlinks convert text or other media into clickable objects.
A hyperlink in HTML is defined by <a> tag and its href attribute. The value
of href in the reference of another web page or a different section within the same
page.

Q.19 What kind of HTML elements are used to display data in rows and
columns? Discuss some of its formatting features?
A. The HTML Table allows us to display the contents (like text, image, links)
in the form of rows and columns. The coordinating place of row with a column is
called a cell. These cells contain some content of the webpage. In HTML, a table is
defined by <table> tag.
FEATURES OF TABLE FORMATTING:
1. ALIGN:
It is specifying the alignment (left, right, center) of a table according to
surrounding text.
2. BGCOLOR:
The background color of the table consists of 6 – digits hexadecimal RGB
code. These color codes are prefixed by a#.
3. BORDER:
This integer attribute defines, in pixels, the size of the frame surrounding the
Page47

table. It enables or disables the border around the table.


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer

4. CELLPADDING:
This attribute defines the space between the content of a cell and its border,
displayed or not. The cellpadding’s length is defined in pixels.
5. C ELLSPACING:
This attribute defines the size of the space between two cells in percentage
value or pixels.
6. WIDTH:
It specifies the width of a table in pixels.
Q.20. What are the differences between rows and columns in HTML?
A. DIFFERENCES BETWEEN ROWS AND COLUMS:
ROWS COLUMS
A row is the collection of all horizontal A column is the collection of all vertical
cell of a table. cells of a table.
They spread from left to right. They spread from top to bottom.
It is defined by <tr> tag. It is defined by <td> tag.
It is placed inside the <table> tag. It is placed inside the row <tr> tag.
Q.21 What do you known about frame and explain its attributes?
A. FRAME:
A HTML element which is used to divide our browser window into
multiple sections where each section can load a separate HTML document is
called frame. It is defined by <frame> tag. Some attributes are used in HTML
frame are:
1. SRC:
The “src” attributes is used to provide the reference URL of another web
page to be displayed in this frame.
2. MARGINHEIGHT:
It defines top and bottom space of a frame.
3. MARGINDTH:
It defines left and right spaces of a frame.

4. NORESIZE:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
It is used to change to size of a frame.
5. SCROLLING:
It defines if the scroll bar should be displayed within the frame or not.
Q.22 Is it possible to display the entire contents of another web page in our
HTML page? How?
A. HTML frames are powerful elements which allows displaying the contents
of another HTML document within a web page. A web page can be divided into
multiple sections and each section and each section display all contents from a
different web pages by using frame.
It is defined by <frame> tag. The src attribute is used to provide the
reference URL of another web page to be displayed in this frame.
Q.23 Write down the difference between frame and frameset?
A. DIFFERENCES BETWEEN FRAME AND FRAMESET:
FRAME FRAMESET
An element in HTML which allows to An element in HTML that consists of a
display the contents of another HTML collection of frame in the browser
document within a web page. window.
It is defined by <frame> tag. It is defined by <frameset> tag.
The frame holds a separate document. The frameset hold one or more frames.
It has attributes; such as, src, margin It has attributes; such as cols and rows.
height, margin width, scrolling etc.
Q.24. List some popular text editors and other tools which help in designing
and development of websites.
A. Following is the list of some popular text editors and other tools that help in
designing and developing a website.
1. Notepad ++
2. Text Mate
3. Microsoft FrontPage
4. Coral Draw
5. Adobe Dreamweaver
6. Wordpress
7. Microsoft Visual Studio
8. Wix
Page47

9. Figma
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
10. CoffeeCup HTML Editor
11. Adobe XD.

SR.No Abbreviations Full Forms


1 WWW World wide Web
2 URL Uniform Resources Locator
3 HTML Hyper Text Markup Language
4 HTTP Hyper Text Transfer Protocol
5 MSN Microsoft Network
6 .COM Commercial
7 HREF Hypertext Reference
8 JPG Joint Photographic Group
9 RGB Red Green Glue
10 OL Ordered List
11 UL Unordered List

Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer

CHAPTER # 7
INTRODUCTION TO DATABASE SYSTEM
Q.1 What do you known about database?
A. DATABASE:
A database is an organized collection of data, generally stored and
accessory electronically from a computer system. Database is mathematically
developed data structure which converts raw input data into meaningful
information for a particular organization. A database is composed of tables
which contains rows and columns. These rows and columns are called
records and fields respectively. Most databases contain multiple tables.
Nowadays database can be seen in every field of life, for example in
industries, health, agriculture schooling, business and banking, etc,
Q.2 Write down the uses of database?
A. USES OF DATABASE:
A database is playing a leading role of enhance the efficiency and
performances any organization. Some uses databases are:
1. They store data and provide facilities (tools) to search for specific
records in a given set of data.
2. They store special information used to manage the data. This
information called metadata and it is not shown to all the people
looking at the data.
3. They can solve cases where many users want to access (and possibly
change) the same entries of data.
4. They manage access rights (who is allowed to see the data, who can
change it).
Q.3 Define Database Management System (DBMS) with examples?
A. DATABASR MANAGEMENT SYSTEM (DBMS):
The Database Management system (DBMS) is the software that
interacts with end users, applications, and the database itself to capture and
analyze the data. Database (DBMS). A Database Management Software
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
(DBMS) is used for storing, manipulating, and managing data, such as
format, names of fields, records and file structure in a database.
Some examples of popular DBMSs used nowadays.
1. MySql 2. Oracle 3. Microsoft SQL Server
4. Mongo DB 5. Visual Foxpro 6. IBM Db2
7. Postgre SQL 7. Microsoft Access
Q.4 Write down the characteristics of Database Management System
(DBMS)?
A. CHARACTERISTICS OF DATA MANAGEMENT SYSTEM:
The DBMS has many characteristics. Some of them are:
1. DBMS can handle large and complex data more conveniently.
2. Multiple users can access DBMS and can view, add, edit and delete
records.
3. A DBMS is more secure and reliable.
4. It increased end – user productivity.
5. A DBMS offers tools like Queries, View and Forms which help users
to manipulate data easily and more efficiency.
6. Preparing backup and providing limited permission to the users.

Q.5 Write down some disadvantages of Database Management System


(DBMS)?
A. DISADVANTAGES OF DATABASE MANAGEMENT:
1. DBMS implementation cost is high as compared to the file system.
2. Database Management system are complex to understand.
3. Database systems require sophisticated hardware and software and
highly skilled personnel.
4. All data is stored into a single database. If database is damaged due to
electric failure, then your valuable.

Q.6 Discuss the use of database in business with example?


A. Database system are very important to our business because they
communicate information related to our sales transactions, product
inventory, customer profiles and marketing activities. Database help to
make our business stronger, raising our ability to increase our profits.
Database are used just about everywhere including banks, retail,
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
websites and warehouses. Banks use database to keep track of customer
accounts, balances and deposits. Retail stores can use database to store
prices, customer information, sales information and quantity on hand.

Q.7 What is flat file system?


A. FLAT FILE SYSTEM:
A flat file system is a database that stores data in a plain text file.
Each line of the text file holds one record, with fields separated by
delimiters, such as commas or tabs. File system provides that details of
the data representation and storage of data. A flat file is the older
version of database. It stores data in a single table structure. It uses a
simple structure; a flat file database cannot contain multiple tables like
a relational database can. It is very difficult of protect a file under the
file system.

Q.8 Write down the differences between DBMS and File system.
A. DIFFERENCES BETWEEN DBMS AND FILE SYSTEM:
BDMS FILE SYSTEM
DBMS is a collection of data. In File system is a collection of data. In
DBMs, the user is not required to this system, the user has to write the
write the procedures. procedures for managing the
database.
DBMS provides a good protection It is very difficult to protect a file
mechanism. under the file system.
Multiple users can access data Only one user access data at a time.
simultaneously.
It supports online access. It does not support remote
connections.
BDMS better for small, medium and It is limited only smaller data
large business. management needs.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
DBMS contains multiple tables. A flat file system cannot contain
multiple tables.
Q.9 Why DBMS is preferred over Flat File System?
A. DBMS provides a crash recovery mechanism, i.e. DBMS protects the
user from the system failure. File system can’t efficiently store and retrieve
the data. DBMS takes cares of concurrent access of data using some form of
locking. A database system is generally used for storing related, structured
data, with well-defined data formats, in an efficient manner for insert, update
and/or retrieval (depending on application). On the other hand, a file system
is a more unstructured data store for storing arbitrary, probably unrelated
data.
Q.10 Describe the basic components of DBMS?
A. The basic components of DBMS are:
1. Table 2. Field 3. Record 4. Data types 5. Views
1. TABLE:
A table is a data structure that organize information into rows and
columns. It can be used to both store and display data in a structured format.
For example, database store data in table so that information can be quickly
accessed from specific rows. A contact list may be one of the simplest
examples of a table.
2. FIELD:
It is the smallest component in a database. It is where the actual data is
stored during data entry. All data fields in the same table, have unique names.
Fields are also called attributes or columns.
3. RECORD:
A record is a database entry that may contain one or more values.
Groups of records are stored in a table, which defines what types of data each
record may contain Records are also referred as tuples or rows. A record is
made up of two or several data items which are also called tuples in a table
representing a set of related data.
4. DATA TYPES:
All fields in a table must have some data types. Data type is a data
storage format that can contain a specific type or range of values. The data
type of a field is a property that tells what kind of data that field can hold.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Some common data types are as follows: integers characters, strings,
floating point number and arrays.
5. VIEWS:
Views represent a subset of the data contained in a table. They can join and
simplify multiple tables into one virtually. Views maintain the security of
data and ensure that no changes occur in the original data.
Q.11 Why is it important to carefully decide the data type for each field?
A. The most important property for a field is its data type determines
the kind of the values that users can store in any given field. The field type
determines the type of data that a user can enter into the field (alphanumeric,
numeric, date and so on) or determined how the field functions in the
database, for example, is an image displayed in the field when a user selects
an image file of an allowed type, does the field link to another field in a
database. MS Access supports different types of data, each with a specific
purpose. The default data type for a field is Text.

Q.12 Write down the differences between table and view?


A. DIFFERENCES BETWEEN TABLE AND VIEW:
TABLE VIEW
A table is an database object that View is database object that allows
stores the data of a database. generating a logical subset of data
from one or more tables.
A table is stored in memory as a A view does not store in memory as
collection of record. collection of records.
Table is an independent data object. View depends on the table.
It is an actual table. It is virtual table.
Q.13 Write down the steps to create a table using Design view?
A. STEPS TO CREATE A TABLE USING DESIGN VIEW:
The steps to create a table using deign view are:
1. Click on the Create tab and click on the Table icon. Then pull down
the View menu choose Design view.
Page47

2. A new table appears in the Table Design view.


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
3. Type the name of a field into the Field Name” column.
4. Then use the drop – down menu in the Data Type” column to assign
the field a data type.
5. Type a description of the data stored in this field.
6. Repeat steps 4 and 5 until you have created all of the necessary Table
fields.
7. Click the “Save” button in the Quick Access toolbar.
8. Then type of a name for the newly created table and click “OK”.

Q.14 Define data modeling and how many components of data modeling
are there?
A. DATA MODELING:
Data modeling is a process of developing conceptual representation of
data object and their relations. Data models are used to express how the
information will be stored in database. This help to identify the most
important fields and remove the irrelevant data. Data models can be used by
database developers to create a physical database. This saves a lot of time and
efforts of developers.
TYPES OF DATA MODELING:
There are three most important components of data models.
1. Entity 2. Relationship 3. Referential Keys
Q.15 Explain entities, attributes and relationships with one example of
each?
A. ENTITIES:
In database term, an entity is an independent table and its field is
Known as attributes. All these entities have some attributes or properties that
give them their identity.
For example, in school database students, teachers, classes, and courses
offered can be considered as entities.
ATTRIBUTES:
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
An attribute is a property of characteristic of an entity. Attribute in
DBMS are the descriptive properties owned by each entity of an entity set.
An entity may contain any number of attributes. Attributes can also be
subdivided into another set of attributes. The attribute (field) must contain a
unique value to identify a record. For example, an EMPLOYEE entity may
be described by the employee’s name, age, address, salary, and job.
RELATIONSHIP:
The connection between two tables is called relationship. A
relationship is established between two databases when one table uses a
foreign key that references the primary key of another table. For example, if
there are two entities can have only one passport and each passport belongs to
only one person.

Q.16 How many types of relationship are there? Explain them.


A. TYPES OF RELATIONSHIP
There are three types of relationships between entities.
1. One to One Relationship
2. One to Many Relationship
3. Many to Many Relationship
ONE TO ONE RELATIONSHIP:
A record in one entity can be connected to only one record in another
entity is called one to one relationship. It is used to divide larger entities into
smaller ones. It is important to note that a one – to one relationship is not a
property of the data, but rather of relationship itself.
ONE TO MANY RELATIONSHIP:
A record in one entity can be connected to many records in another
entity. This is the most common type of relationship used in relational
database. This relation can also see as Many to One Relationship.

MANY TO MANY RELATIONSHIP:


In this type of relationship, one more record of one entity is connected to one
or more records of another entity. Usually, a third entity known as “junction table”
is to create the many – to many relationships between two related entities.
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Q.17 Define referential keys and explain its types?
A. REFERENTIAL KEYS:
Referential integrity to the relationship between tables. Because each table
in a database must have a primary key this primary key can appear in other table
because of its relationship to data within those tables. Referential integrity is the
logical dependency of a foreign key on a primary key.
TYPES OF REFERENTIAL:
There are two most common types of referential keys.
1. Primary Key 2. Foreign Key
1. PRIMARY KEY:
A primary key is used to uniquely identify a record in an entity. The Primary
Key can’t be a duplicate meaning the same value can’t appear more than
once in the table. A table cannot have more than one primary key.
RULES FOR DEFINING PRIMARY KEY:
 Two rows can’t have the same primary key value.
 It must for every row to have a primary key value.
 The primary key field cannot be null.
 The value in a primary key column can never be modified or updated if any
foreign key refers to that primary key.
2. FOREIGN KEY:
A foreign key is used to define the connection or relation between two
entities. When a foreign key is applied on an attributed, it enforces that the
value for that attribute should match any record in the related entity having
primary key.

Q.18 Write down the differences between primary key and foreign key?
A. DIFFERENCES BETWEEN PRIMARY KEY AND FOREIGN KEY:
PRIMARY KEY FOREIGN KEY
A primary key is used to uniquely A foreign key is used to define the
identify a record in an entity. connection or relationship between two
entities.
Primary Key never accept null values. A foreign key may accept multiple null
values.
We can have never accepted null values. We can have multiple foreign keys in a
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
table.
It helps us to uniquely identify a record It is a field in the table that is the
in the table. primary key of another table.
Q.19 Define ER model and explain components of ER model?
A. ER MODEL:
Entity Relationship Model (ERM) or Entity Relationship Diagram (ERD)
describe the entities, attribute and relationships with their types in a simplified
diagram. This model or diagram can itself be used as the references for designing
an actual database. It can even be used as a backup for the structure of a database.
 Entities
 Relationships
 Attributes

COMPONENTS OF ER MODEL:
ER Design is made up of different components like entities, attribute and
relationships. There are defined symbols and shapes to represent each one of them.
Some of the shapes used to define these components are:
SYMBOLS USES
An ellipse defines an attribute of an
entity. One entity may contain multiple
attributes are defined by multiple
ellipses.

A rectangle is used to define an entity.


Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
Relationships are symbolic represented
by diamond shape. It simply states the
type of relationship between two
entities.

1 1 Connection shows the type relationship


between two entities. These lines are
annotated by 1 or M (stands for Many)
1 M at their ends to describe the type of
relationships.

Q.20 Design ER model for a database in MS Access?


A. ER MODEL FOR A DATABASE IN MS ACCESS:
> Open the Microsoft Access database software and open the database
in which you want to create the diagram.
> Click the “File” menu item and select “New”. Click “Software and
Database”. And then select “Database Model Diagram.” A new
window open with a blank diagram.

ABBREVIATIONS
CHAPTER # 7 “INTRODUCTION TO DATABASE SYSTEM”
S.R.NO ABBERVIATIONS FULL FORMS
01 DB Data base
Page47

02 NADRA National Database Registration Authority

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
03 DBMS Database Management System
04 SQL Structure Query Language
05 RDBMS Relational Database Management Software
06 ERM Entity Relationship Model
07 ERD Entity Relationship Diagram

ABBREVIATIONS
CHAPTER # 1
FUNDAMENTAL OF COMPUTER
S.No Abbreviation FULL FORMS
01 ATM Automated Teller Machine
02 IBM International Business Machine
03 ENIAC Electronic Numerical Integrator and Calculator
04 EDVAC Electronic Discrete Variable Automatic Computer
05 EDSAC Electronic Delay Storage Automatic Computer
06 UNIVAC Universal Automatic Computer
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
07 COBOL Common Business Oriented Language
08 FORTRAN Formula Translation
09 IC Integrated Circuit
10 VLSI Very Large – scale Integration
11 SSI Small Scale Integration
12 LSI Large Scale Integration
13 MSI Multiple Scale Integration
14 GUI Graphical User Interface
15 ANSI American National Standard Institute
16 DEC VAX Digital Equipment Corporation, Virtual Address
Extension.
17 3D Three Dimensional
18 ICs Integrated Circuits
19 AI Artificial Intelligence
20 3GL 3rd Generation Language
21 4GL 4th Generation Language
22 IR Infrared
23 RF Radio Frequency
24 GPS Global Positioning System
25 CS Computer Science
26 IT Information Technology
27 LMS Learning Management System
28 WWW World Wide Web
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
29 BIOS Basic Input Output System
30 CPU Central Processing Unit
31 CU Control Unit
32 ALU Arithmetic Logic Unit
33 MU Memory Unit
34 RAM Random Access Memory
35 ROM Read Only Memory
36 IOU Input Output Unit
37 SVGA Super Video Graphic
38 CGA Color Graphic Array
39 VGA Video Graphic Array
40 EGA Enhance Graphic Array
41 PCI Peripheral Component Interconnected
42 CMOS Complementary Metal Oxide Semiconductor
43 MHz Mega Hertz
44 GHz Giga Hertz
45 BIT Binary Digit
46 OMR Optical Barcode Reader
47 OBR Optical Character Recognition
48 OCR Magnetic Ink Character Recognition
49 MICR Magnetic Ink Character Recognition
50 CRT Cathode Ray Tube
51 LCD Liquid Crystal Display
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
52 LED Light Emitting Diode
53 FDP Flat Display Panel
54 VDU Visual Display Unit
55 CD Compact Disk
56 HDD Hard Disk Derive
57 DVD Digital Versatile
58 SD Secure Digital
59 USB Universal Serial Bus
60 SRAM Static Random – Access Memory
61 DRAM Dynamic Random – Access Memory
62 SDRAM Synchronous Dynamic Random – Access Memory
63 SIMM Single In – in Memory Module
64 DIMM Dual In – line Memory Module
65 PROM Programmable Read Only Memory
66 EPROM Erasable Programmable Read Only Memory
67 EEPROM Electrically Erasable Programmable Read Only
Memory.

ABBREVIATIONS
CHAPTER # 2
OPERATING SYSTEM
SR.NO ABBREVIATIONS FULL FORMS
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
01 OS Operating System
02 IOS Input Output system
03 UI User Interface
04 I/O Input/output
05 CLI Command Line Interface
06 GUI Graphical User Interface
07 DOS Disk Operating System
08 CD Compact Disk
09 DVD Digital Versatile Disk
10 USB Universal Serial Bus
11 GB Giga Byte
12 GHz Giga Hertz
13 WIDDM Windows Display Driver Model
14 BIOS Basic Input Output System
15 AVG Anti Virus Guard
ABBREVIATIONS
CHAPTER # 3
OFFICE AUTOMATION
SR.NO ABBREIVATIONS FULL FORMS
01 MS Micrsoft
02 WYSIWYG What You See Is What You Get
03 TOC Table Of Content
04 CV Curriculum Vitae
Page47

ABBREVIATIONS
Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
CHAPTER # 4
DATA COMMUNICATION &COMPUTER NETWORK
SR.NO ABBERVIATIONS FULL FORMS
01 Bit Binary Digit
02 Kbps Kilo Byte
03 Bps Byte Per Second
04 SNR Signal Noise Ratio
05 UTP Unshielded Twisted Pair
06 STP Shielded Twisted Pair
07 FM Frequency Modulation
08 LCD Liquid Crystal Display
09 MODEM Modulator Demodulator
10 DSL Digital Subscriber Link
11 ISDN Integrated Services Digital Network
12 NIC Network Interface card
13 LAN Local Area Network
14 MAN Metropolitan Area Network
15 WAN Wide Area Network
16 ISO International Standard Organizations
17 IEEE Institute of Electrical and Electronic
Engineering
18 IETF International Engineering Task Manager
19 ITU International Telecommunication Union
20 ANSI American National Standard Institute
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
21 OSI Open System Interconnection
22 TCP Transmission Control Protocol
23 ASCII American Standard Code Information
Interchange
24 MAC Media Access Control
25 IP Internet Protocol
26 UDP User Datagram Protocol
27 HTTP Hyper Text Transfer Protocol
28 FTP File Transfer Protocol
29 ISP Internet Service Provider
30 IPV Internet Protocol Version

ABBREVIATIONS
CHAPTER # 5 “COMPUTER SECURITY & ETHICS”
SR.NO ABBREVIATIONS FULL FORMS
01 ATM Automated Teller Machine
02 PIN Personal Identification Number
03 IPO Intellectual property Organization
ABBREVIATIONS
CHAPTER # 6
WEB DEVELOPMENT
S.No Abbreviations Full Forms
1 WWW World wide Web
2 URL Uniform Resources Locator
3 HTML Hyper Text Markup Language
Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
4 HTTP Hyper Text Transfer Protocol
5 MSN Microsoft Network
6 .COM Commercial
7 HREF Hypertext Reference
8 JPG Joint Photographic Group
9 RGB Red Green Glue
10 OL Ordered List
11 UL Unordered List

ABBREVIATIONS
CHAPTER # 7 “INTRODUCTION TO DATABASE SYSTEM”
S.R.NO ABBERVIATIONS FULL FORMS
01 DB Data base
02 NADRA National Database Registration Authority
03 DBMS Database Management System
04 SQL Structure Query Language
05 RDBMS Relational Database Management Software
06 ERM Entity Relationship Model
07 ERD Entity Relationship Diagram

CHAPTER # 3
“OFFICE AUTOMATION”
HOT KEYS
SR.NO ACTION SHORT KEYS
01 To change the margins of entire document Alt + P + M
Page47

of selected section.

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer
02 To set the contents of the page or section in Alt + P + O
portrait or landscape.
03 To choose the size of the paper. Alt + P + S + Z
04 To split the text into two or more vertical Alt + P + J
columns.
05 To insert page , section or column break in Alt + P + B
the document.
06 To add line number on the left side of each ALT + +P+L+N
line of the document.
07 To specify how hyphenation in a document ALT + P + H
should be applied.
08 To display faded background image behind ALT + P + P + W
the text in a document.
09 To apply a color for the background of the ALT + P + P + C
page.
10 To put a border around the page. ALT + P + P + B
11 To define amount of blank space from left ALT + P + I + L
side.
12 To define amount of bank space from right ALT + P + I + R
sides
13 To indicate spaces before the selected ALT + P + S + B
paragraph.
14 To indicate spaces after the selected ALT + P + S+ A
paragraph.
15 To place an object (picture or shape) on the ALT + P + S + A
page.
Page47

16 To arrange the text around an object. ALT + P + P + O


Courtesy: Sir Qamar Contact: R-1133 Block 20,
F.B Area, Karachi.
“Mentoring is Better than Teaching”
“Enter to Learn, Leave to Serve”
Excellence Coaching Network IX
Science Computer

17 To bring a selected object in front of all ALT + P + T + W


other object.
18 To send a selected object behind all other ALT + P + A + F
objects.
19 To select, show, hide and change the order ALT + P + A+P
of objects in the document.
20 To select alignment of objects. ALT + P + A+P
21 To combine two or more objects together ALT + + A + G
into a single object.
22 To rotate or flip the selected object. ALT + P + A+Y

Page47

Courtesy: Sir Qamar Contact: R-1133 Block 20,


F.B Area, Karachi.
“Mentoring is Better than Teaching”

You might also like